F-SECURE ANTI-VIRUS - FOR MICROSOFT EXCHANGE Deployment Manual page 4

Hide thumbs Also See for ANTI-VIRUS - FOR MICROSOFT EXCHANGE:
Table of Contents

Advertisement

Chapter 3
3.1
System Requirements................................................................................................ 30
3.1.1 Installation on Microsoft Exchange Server 2003 ............................................ 30
3.1.2 Installation on Microsoft Exchange Server 2007 ............................................ 32
3.1.3 Installation on Microsoft Exchange Server 2010 ............................................ 34
3.2
Centralized Management Requirements.................................................................... 35
3.3
Other System Component Requirements .................................................................. 35
3.3.1 SQL Server Requirements ............................................................................. 36
3.3.2 Additional Windows Components................................................................... 38
3.3.3 Web Browser Software Requirements ........................................................... 38
3.4
Improving Reliability and Performance ...................................................................... 38
3.5
Centrally Administered or Stand-alone Installation? .................................................. 39
3.6
Installation Overview .................................................................................................. 40
3.7
Installing F-Secure Anti-Virus for Microsoft Exchange............................................... 41
3.8
After the Installation ................................................................................................... 54
3.8.2 Configuring the Product.................................................................................. 55
3.9
Upgrading from Previous Product Versions ............................................................... 57
3.10 Upgrading the Evaluation Version.............................................................................. 59
3.11 Uninstalling F-Secure Anti-Virus for Microsoft Exchange .......................................... 60
4.1
Overview ....................................................................................................................62
4.2
Realtime Blackhole List Configuration ....................................................................... 63
4.2.1 Configuring Realtime Blackhole Lists ............................................................. 63
4.2.2 Optimizing F-Secure Spam Control Performance .......................................... 65
A.1 Installation Overview ................................................................................................. 68
A.2 Creating Quarantine Storage ..................................................................................... 70
A.2.1 Quarantine Storage in Active-Passive Cluster ............................................... 70
A.2.2 Quarantine Storage in Active-Active Cluster .................................................. 75
2
29
61
67

Advertisement

Table of Contents
loading

Table of Contents